Quantum Key Distribution Using Three Basis States

Subhash Kak
DOI: https://doi.org/10.48550/arXiv.quant-ph/9902038
2000-06-07
Abstract:This note presents a method of public key distribution using quantum communication of n photons that simultaneously provides a high probability that the bits have not been tampered. It is a three-state variant of the quantum method of Bennett and Brassard (BB84) where the transmission states have been decreased from 4 to 3 and the detector states have been increased from 2 to 3. Under certain assumptions regarding method of attack, it provides superior performance (in terms of the number of usable key bits) for n < 18 m, where m is the number of key bits used to verify the integrity of the process in the BB84-protocol.
Quantum Physics
What problem does this paper attempt to address?
The problem that this paper attempts to solve is in quantum key distribution, by reducing the number of transmitted states (from 4 to 3) and increasing the number of detected states (from 2 to 3), to improve the efficiency and security of key distribution. Specifically, the author proposes a new protocol. Under certain assumptions, for the case where the key length is less than 18 times the verification digit number, this protocol can provide more available key digits than the BB84 protocol and has a higher authentication probability. ### Background and Problem Description of the Paper Quantum Key Distribution (QKD) is a technology that uses the principles of quantum mechanics to achieve secure communication. The most famous QKD protocol is the BB84 protocol, proposed by Bennett and Brassard in 1984. The BB84 protocol uses 4 different photon polarization states (0°, 45°, 90°, 135°) and two detection bases ((0°, 90°) and (45°, 135°)) to ensure the security of the key. However, the BB84 protocol requires additional information exchange during the key distribution process to verify the integrity of the key, which increases the complexity of communication. ### Goals of the New Protocol The author of this paper, Subhash Kak, proposes a new quantum key distribution protocol that uses 3 photon polarization states (0°, 45°, 90°) and 3 detection bases. The author hopes that through this asymmetric method, in some cases (especially when the key length is short), it can provide better performance than the BB84 protocol. Specific goals include: 1. **Improve key generation efficiency**: In the case of a short key length, the new protocol can generate more available key digits. 2. **Enhance security**: By increasing the number of detection bases, the new protocol can more effectively detect an eavesdropper's attack. 3. **Reduce information exchange**: The new protocol reduces the additional information exchange required after key distribution, thus simplifying the entire process. ### Main Contributions 1. **Key generation efficiency**: For the case where the key length \( n \) is less than 18 times the verification digit number \( m \), the new protocol can generate more available key digits. For example, when \( n = 54 \) and \( m = 6 \), the new protocol can generate 24 available key bits, while the BB84 protocol can only generate 21. 2. **Authentication probability**: The new protocol has a higher authentication probability. When \( n < 18m \), the authentication probability of the new protocol is \( 1 - 3^{-n/9} \), while the authentication probability of the BB84 protocol is \( 1 - 2^{-m} \). 3. **No need for additional information exchange**: The new protocol does not require further information exchange to verify the integrity of the key after the initial step, unless a higher authentication probability is required. ### Conclusion By introducing asymmetric photon polarization states and detection bases, the new protocol provides better performance than the BB84 protocol in some cases. This method not only improves the efficiency of key generation but also enhances the security of the system and simplifies the key distribution process. Although the new protocol has some improvements in certain aspects, its practical application effect still needs further research and experimental verification.